By Topic

Computer

Issue 3 • Date March 2005

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (617 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (649 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (50 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (143 KB) | HTML iconHTML
    Freely Available from IEEE
  • Engineers, Programmers, and Black Boxes

    Publication Year: 2005, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Behind most of the classes an engineer encounters as an undergraduate is one overriding paradigm: the black box. A black box takes one or more inputs, performs some function on them, and produces one output. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2005, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search engines tackle the desktop

    Publication Year: 2005, Page(s):14 - 17
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    As PC hard drives get bigger and new information sources become available, users will have much more data of different types, including multimedia, on their computers. This makes it increasingly difficult to find documents, e-mail messages, spreadsheets, audio clips, and other files. Current desktop-based search capabilities, such as those in Windows, are inadequate to meet this challenge. Desktop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is it time for clockless chips? [Asynchronous processor chips]

    Publication Year: 2005, Page(s):18 - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Vendors are revisiting an old concept - the clockless chip - as they look for new processor approaches to work with the growing number of cellular phones, PDAs, and other high-performance, battery-powered devices. Clockless processors, also called asynchronous or self-timed, don't use the oscillating crystal that serves as the regularly "ticking" clock that paces the work done by traditional synch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (297 KB) | HTML iconHTML
    Freely Available from IEEE
  • Integrating biological research through Web services

    Publication Year: 2005, Page(s):26 - 31
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Web services might be a way to solve the integration problem because Web services technology provides a higher layer of abstraction that hides implementation details from applications. Using this technology, applications invoke other applications' functions through well-defined, easy-to-use interfaces. To test the potential of a Web services solution, we implemented a microarray data-mining system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socially aware, computation and communication

    Publication Year: 2005, Page(s):33 - 40
    Cited by:  Papers (67)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1848 KB) | HTML iconHTML

    Although developers of communication-support tools have certainly tried to create products that support group thinking, they usually do so without adequately accounting for social context, so that all too often these systems are jarring and even downright rude. In fact, most people would agree that today's communication technology seems to be at war with human society. Technology must account for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing smart artifacts for smart environments

    Publication Year: 2005, Page(s):41 - 49
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    Smart artifacts promise to enhance the relationships among participants in distributed working groups, maintaining personal mobility while offering opportunities for the collaboration, informal communication, and social awareness that contribute to the synergy and cohesiveness inherent in collocated teams. Two complementary trends have resulted in the creation of smart environments that integrate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Gator Tech Smart House: a programmable pervasive space

    Publication Year: 2005, Page(s):50 - 60
    Cited by:  Papers (261)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Compu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-log-driven business activity monitoring

    Publication Year: 2005, Page(s):61 - 68
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Business process transformation defines a new level of business optimization that manifests as a range of industry-specific initiatives that bring processes, people, and information together to optimize efficiency. This new optimization level is possible because the Web has assumed the role of a common infrastructure. To examine how BPT can optimize an organization's processes, we describe a corpo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2005, Page(s):75 - 79
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2005, Page(s):80 - 82
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s):83 - 84
    Request permission for commercial reuse | PDF file iconPDF (376 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2005, Page(s): 85
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2005, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building the software radio

    Publication Year: 2005, Page(s):87 - 89
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    People have been working on software radio for about few years. Software radio is just what it sounds like - a radio that uses software to perform many of the signal processing tasks that analog circuits traditionally handle. Software radio could turn out to be a paradigm shift for communication systems. The US Defense Advanced Projects Research Agency (DARPA) kicked off research into software rad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public opinion's influence on voting system technology

    Publication Year: 2005, Page(s):93 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The US general election in 2000 represents a turning point in elections history. A laborious count and analysis of what was statistically a tie vote in Florida decided the highly scrutinized contest for US president. Simultaneously, voting system standards continued evolving, spurred in part by the introduction of new, high-power technologies. These factors, coupled with an unprecedented level of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The winner's curse in high tech [telecommunication industry]

    Publication Year: 2005, Page(s):96 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    The recent book, Beware the Winner's Curse: Victories that Can Sink You and Your Company (Oxford Univ. Press, 2004), outlines a number of cases in which companies experienced the winner's curse, presents industry-specific ideas, and offers a general framework for improving management decision making in these circumstances. The winner's curse is especially prevalent in technology given the importan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An open-secret voting system

    Publication Year: 2005, Page(s):98 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Electronic voting machines allow software configuration of the ballots, adapt to a voter's first language, and offer a touch-screen interface's ease of use. These machines also make it easy to change a selection before pressing a final accept button. But as a means for counting votes, computer-based devices raise suspicions as to what exactly is going on inside the black box. It's not hard to imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com